Lucene search

K
cve[email protected]CVE-2013-1730
HistorySep 18, 2013 - 10:08 a.m.

CVE-2013-1730

2013-09-1810:08:24
CWE-119
web.nvd.nist.gov
48
cve-2013-1730
mozilla firefox
thunderbird
seamonkey
remote code execution
denial of service
xbl-backed nodes

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.4 High

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%

Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.

Affected configurations

NVD
Node
mozillathunderbirdRange17.0.9
OR
mozillathunderbirdMatch17.0
OR
mozillathunderbirdMatch17.0.1
OR
mozillathunderbirdMatch17.0.2
OR
mozillathunderbirdMatch17.0.3
OR
mozillathunderbirdMatch17.0.4
OR
mozillathunderbirdMatch17.0.5
OR
mozillathunderbirdMatch17.0.6
OR
mozillathunderbirdMatch17.0.7
OR
mozillathunderbirdMatch17.0.8
Node
mozillaseamonkeyRange2.20
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0rc2
OR
mozillaseamonkeyMatch2.0.1
OR
mozillaseamonkeyMatch2.0.2
OR
mozillaseamonkeyMatch2.0.3
OR
mozillaseamonkeyMatch2.0.4
OR
mozillaseamonkeyMatch2.0.5
OR
mozillaseamonkeyMatch2.0.6
OR
mozillaseamonkeyMatch2.0.7
OR
mozillaseamonkeyMatch2.0.8
OR
mozillaseamonkeyMatch2.0.9
OR
mozillaseamonkeyMatch2.0.10
OR
mozillaseamonkeyMatch2.0.11
OR
mozillaseamonkeyMatch2.0.12
OR
mozillaseamonkeyMatch2.0.13
OR
mozillaseamonkeyMatch2.0.14
OR
mozillaseamonkeyMatch2.1
OR
mozillaseamonkeyMatch2.1alpha1
OR
mozillaseamonkeyMatch2.1alpha2
OR
mozillaseamonkeyMatch2.1alpha3
OR
mozillaseamonkeyMatch2.1beta1
OR
mozillaseamonkeyMatch2.1beta2
OR
mozillaseamonkeyMatch2.1beta3
OR
mozillaseamonkeyMatch2.1rc1
OR
mozillaseamonkeyMatch2.1rc2
OR
mozillaseamonkeyMatch2.10
OR
mozillaseamonkeyMatch2.10beta1
OR
mozillaseamonkeyMatch2.10beta2
OR
mozillaseamonkeyMatch2.10beta3
OR
mozillaseamonkeyMatch2.10.1
OR
mozillaseamonkeyMatch2.11
OR
mozillaseamonkeyMatch2.11beta1
OR
mozillaseamonkeyMatch2.11beta2
OR
mozillaseamonkeyMatch2.11beta3
OR
mozillaseamonkeyMatch2.11beta4
OR
mozillaseamonkeyMatch2.11beta5
OR
mozillaseamonkeyMatch2.11beta6
OR
mozillaseamonkeyMatch2.12
OR
mozillaseamonkeyMatch2.12beta1
OR
mozillaseamonkeyMatch2.12beta2
OR
mozillaseamonkeyMatch2.12beta3
OR
mozillaseamonkeyMatch2.12beta4
OR
mozillaseamonkeyMatch2.12beta5
OR
mozillaseamonkeyMatch2.12beta6
OR
mozillaseamonkeyMatch2.12.1
OR
mozillaseamonkeyMatch2.13
OR
mozillaseamonkeyMatch2.13beta1
OR
mozillaseamonkeyMatch2.13beta2
OR
mozillaseamonkeyMatch2.13beta3
OR
mozillaseamonkeyMatch2.13beta4
OR
mozillaseamonkeyMatch2.13beta5
OR
mozillaseamonkeyMatch2.13beta6
OR
mozillaseamonkeyMatch2.13.1
OR
mozillaseamonkeyMatch2.13.2
OR
mozillaseamonkeyMatch2.14
OR
mozillaseamonkeyMatch2.14beta1
OR
mozillaseamonkeyMatch2.14beta2
OR
mozillaseamonkeyMatch2.14beta3
OR
mozillaseamonkeyMatch2.14beta4
OR
mozillaseamonkeyMatch2.14beta5
OR
mozillaseamonkeyMatch2.15
OR
mozillaseamonkeyMatch2.15beta1
OR
mozillaseamonkeyMatch2.15beta2
OR
mozillaseamonkeyMatch2.15beta3
OR
mozillaseamonkeyMatch2.15beta4
OR
mozillaseamonkeyMatch2.15beta5
OR
mozillaseamonkeyMatch2.15beta6
OR
mozillaseamonkeyMatch2.15.1
OR
mozillaseamonkeyMatch2.15.2
OR
mozillaseamonkeyMatch2.16
OR
mozillaseamonkeyMatch2.16beta1
OR
mozillaseamonkeyMatch2.16beta2
OR
mozillaseamonkeyMatch2.16beta3
OR
mozillaseamonkeyMatch2.16beta4
OR
mozillaseamonkeyMatch2.16beta5
OR
mozillaseamonkeyMatch2.16.1
OR
mozillaseamonkeyMatch2.16.2
OR
mozillaseamonkeyMatch2.17
OR
mozillaseamonkeyMatch2.17beta1
OR
mozillaseamonkeyMatch2.17beta2
OR
mozillaseamonkeyMatch2.17beta3
OR
mozillaseamonkeyMatch2.17beta4
OR
mozillaseamonkeyMatch2.17.1
OR
mozillaseamonkeyMatch2.18beta1
OR
mozillaseamonkeyMatch2.18beta2
OR
mozillaseamonkeyMatch2.18beta3
OR
mozillaseamonkeyMatch2.18beta4
OR
mozillaseamonkeyMatch2.19
OR
mozillaseamonkeyMatch2.19beta1
OR
mozillaseamonkeyMatch2.19beta2
OR
mozillaseamonkeyMatch2.20beta1
OR
mozillaseamonkeyMatch2.20beta2
OR
mozillaseamonkeyMatch2.20beta3
Node
mozillafirefox_esrMatch17.0
OR
mozillafirefox_esrMatch17.0.1
OR
mozillafirefox_esrMatch17.0.2
OR
mozillafirefox_esrMatch17.0.3
OR
mozillafirefox_esrMatch17.0.4
OR
mozillafirefox_esrMatch17.0.5
OR
mozillafirefox_esrMatch17.0.6
OR
mozillafirefox_esrMatch17.0.7
OR
mozillafirefox_esrMatch17.0.8
Node
mozillafirefoxRange23.0.1
OR
mozillafirefoxMatch19.0
OR
mozillafirefoxMatch19.0.1
OR
mozillafirefoxMatch19.0.2
OR
mozillafirefoxMatch20.0
OR
mozillafirefoxMatch20.0.1
OR
mozillafirefoxMatch21.0
OR
mozillafirefoxMatch22.0
OR
mozillafirefoxMatch23.0
Node
mozillathunderbird_esrMatch17.0
OR
mozillathunderbird_esrMatch17.0.1
OR
mozillathunderbird_esrMatch17.0.2
OR
mozillathunderbird_esrMatch17.0.3
OR
mozillathunderbird_esrMatch17.0.4
OR
mozillathunderbird_esrMatch17.0.5
OR
mozillathunderbird_esrMatch17.0.6
OR
mozillathunderbird_esrMatch17.0.7
OR
mozillathunderbird_esrMatch17.0.8

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

9.4 High

AI Score

Confidence

High

0.023 Low

EPSS

Percentile

89.7%